Publications équipe CRYPTO - 2009

Articles

  1. Jun Yajima, Terutoshi Iwasaki, Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Thomas Peyrin, Noboru Kunihiro and Kazuo Ohta. A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search. IEICE Transactions 92-A(1):87-95, 2009. BibTeX

    @article{YINS2009,
    	author = "Jun Yajima and Terutoshi Iwasaki and Yusuke Naito and Yu Sasaki and Takeshi Shimoyama and Thomas Peyrin and Noboru Kunihiro and Kazuo Ohta",
    	title = "A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search",
    	journal = "IEICE Transactions",
    	year = 2009,
    	volume = "92-A",
    	pages = "87-95",
    	number = 1,
    	annote = "revint",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://search.ieice.org/bin/summary.php?id=e92-a_1_87{\&}category=A{\&}year=2009{\&}lang=E{\&}abst="
    }
    
  2. Côme Berbain, Henri Gilbert and Jacques Patarin. QUAD: A multivariate stream cipher with provable security. J. Symb. Comput. 44(12):1703-1723, 2009. BibTeX

    @article{BeGP2009,
    	author = "C{\^o}me Berbain and Henri Gilbert and Jacques Patarin",
    	title = "QUAD: A multivariate stream cipher with provable security",
    	journal = "J. Symb. Comput.",
    	year = 2009,
    	volume = 44,
    	pages = "1703-1723",
    	number = 12,
    	annote = "revint",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://dx.doi.org/10.1016/j.jsc.2008.10.004"
    }
    

Books

  1. Antoine Joux. Algorithmic Cryptanalysis. Première edition, Chapman & Hall/CRC, 2009. BibTeX

    @book{Joux2009,
    	title = "Algorithmic Cryptanalysis",
    	publisher = "Chapman \& Hall/CRC",
    	year = 2009,
    	author = "Joux, Antoine",
    	edition = "1st",
    	annote = "livre",
    	isbn = "1420070029, 9781420070026"
    }
    

Inbook

  1. Mercè Serra, Bert Greevenbosch, Anja Becker and Harald Fuchs. Overview of OMA Digital Rights Management, in Handbook of Research on Secure Multimedia Distribution. pages 55-70, 2009. BibTeX

    @inbook{J2009,
    	pages = "55-70",
    	title = "Overview of OMA Digital Rights Management, in Handbook of Research on Secure Multimedia Distribution",
    	year = 2009,
    	author = "{Merc{\`e} Serra} Joan and Bert Greevenbosch and Anja Becker and Harald Fuchs",
    	annote = "chapitre",
    	booktitle = "Handbook of Research on Secure Multimedia Distribution"
    }
    

Inproceedings

  1. Joana Treger and Jacques Patarin. Generic Attacks on Feistel Networks with Internal Permutations. In Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings. 2009, 41-59. BibTeX

    @inproceedings{TrPa2009,
    	author = "Joana Treger and Jacques Patarin",
    	title = "Generic Attacks on Feistel Networks with Internal Permutations",
    	booktitle = "Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings",
    	year = 2009,
    	pages = "41-59",
    	annote = "confint"
    }
    
  2. Nicky Mouha, Gautham Sekar, Jean-Philippe Aumasson, Thomas Peyrin, Søren S Thomsen, Meltem Sönmez Turan and Bart Preneel. Cryptanalysis of the ESSENCE Family of Hash Functions. In Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers. 2009, 15-34. BibTeX

    @inproceedings{MSAP2009,
    	author = {Nicky Mouha and Gautham Sekar and Jean-Philippe Aumasson and Thomas Peyrin and S{\o}ren S. Thomsen and Meltem S{\"o}nmez Turan and Bart Preneel},
    	title = "Cryptanalysis of the ESSENCE Family of Hash Functions",
    	booktitle = "Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers",
    	year = 2009,
    	pages = "15-34",
    	annote = "confint"
    }
    
  3. Florian Mendel, Thomas Peyrin, Christian Rechberger and Martin Schläffer. Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher. In Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers. 2009, 16-35. BibTeX

    @inproceedings{MPRS2009,
    	author = {Florian Mendel and Thomas Peyrin and Christian Rechberger and Martin Schl{\"a}ffer},
    	title = "Improved Cryptanalysis of the Reduced Gr{\o}stl Compression Function, ECHO Permutation and AES Block Cipher",
    	booktitle = "Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers",
    	year = 2009,
    	pages = "16-35",
    	annote = "confint"
    }
    
  4. Antoine Joux and Stefan Lucks. Improved Generic Algorithms for 3-Collisions. In Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings. 2009, 347-363. BibTeX

    @inproceedings{JoLu2009a,
    	author = "Antoine Joux and Stefan Lucks",
    	title = "Improved Generic Algorithms for 3-Collisions",
    	booktitle = "Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings",
    	year = 2009,
    	pages = "347-363",
    	annote = "confint"
    }
    
  5. Antoine Joux, Reynald Lercier, David Naccache and Emmanuel Thomé. Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms. In Cryptography and Coding, 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings. 2009, 351-367. BibTeX

    @inproceedings{JLNT2009,
    	author = "Antoine Joux and Reynald Lercier and David Naccache and Emmanuel Thom{\'e}",
    	title = "Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms",
    	booktitle = "Cryptography and Coding, 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings",
    	year = 2009,
    	pages = "351-367",
    	annote = "confint"
    }
    
  6. Thomas Fuhr and Thomas Peyrin. Cryptanalysis of RadioGatún. In Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers. 2009, 122-138. BibTeX

    @inproceedings{FuPe2009,
    	author = "Thomas Fuhr and Thomas Peyrin",
    	title = "Cryptanalysis of RadioGat{\'u}n",
    	booktitle = "Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers",
    	year = 2009,
    	pages = "122-138",
    	annote = "confint"
    }
    
  7. Luca De Feo and Éric Schost. Fast arithmetics in artin-schreier towers over finite fields. In Symbolic and Algebraic Computation, International Symposium, ISSAC 2009, Seoul, Republic of Korea, July 29-31, 2009, Proceedings. 2009, 127-134. BibTeX

    @inproceedings{DeSc2009,
    	author = "Luca {De Feo} and {\'E}ric Schost",
    	title = "Fast arithmetics in artin-schreier towers over finite fields",
    	booktitle = "Symbolic and Algebraic Computation, International Symposium, ISSAC 2009, Seoul, Republic of Korea, July 29-31, 2009, Proceedings",
    	year = 2009,
    	pages = "127-134",
    	annote = "confint"
    }
    
  8. Jean-Sébastien Coron, Antoine Joux, Ilya Kizhvatov, David Naccache and Pascal Paillier. Fault Attacks on RSA Signatures with Partially Unknown Messages. In Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings. 2009, 444-456. BibTeX

    @inproceedings{CJKN2009a,
    	author = "Jean-S{\'e}bastien Coron and Antoine Joux and Ilya Kizhvatov and David Naccache and Pascal Paillier",
    	title = "Fault Attacks on RSA Signatures with Partially Unknown Messages",
    	booktitle = "Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings",
    	year = 2009,
    	pages = "444-456",
    	annote = "confint"
    }
    
  9. Guilhem Castagnos and Fabien Laguillaumie. On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis. In Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings. 2009, 260-277. BibTeX

    @inproceedings{CaLa2009,
    	author = "Guilhem Castagnos and Fabien Laguillaumie",
    	title = "On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis",
    	booktitle = "Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings",
    	year = 2009,
    	pages = "260-277",
    	annote = "confint"
    }
    
  10. Guilhem Castagnos, Antoine Joux, Fabien Laguillaumie and Phong Q Nguyen. Factoring ıt pq$^2$ with Quadratic Forms: Nice Cryptanalyses. In Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings. 2009, 469-486. BibTeX

    @inproceedings{CJLN2009,
    	author = "Guilhem Castagnos and Antoine Joux and Fabien Laguillaumie and Phong Q. Nguyen",
    	title = "Factoring {\it pq}$^{2}$ with Quadratic Forms: Nice Cryptanalyses",
    	booktitle = "Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings",
    	year = 2009,
    	pages = "469-486",
    	annote = "confint"
    }
    
  11. Guilhem Castagnos, Alexandre Berzati, Cécile Canovas, Blandine Debraize, Louis Goubin, Aline Gouget, Pascal Paillier and Stephanie Salgado. Fault Analysis of Grain-128. In IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2009, San Francisco, CA, USA, July 27, 2009. Proceedings. 2009, 7-14. BibTeX

    @inproceedings{CBCD2009,
    	author = "Guilhem Castagnos and Alexandre Berzati and C{\'e}cile Canovas and Blandine Debraize and Louis Goubin and Aline Gouget and Pascal Paillier and Stephanie Salgado",
    	title = "Fault Analysis of Grain-128",
    	booktitle = "IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2009, San Francisco, CA, USA, July 27, 2009. Proceedings",
    	year = 2009,
    	pages = "7-14",
    	annote = "confint"
    }
    
  12. Sébastien Canard, Cécile Delerablée, Aline Gouget, Emeline Hufschmitt, Fabien Laguillaumie, Hervé Sibert, Jacques Traoré and Damien Vergnaud. Fair E-Cash: Be Compact, Spend Faster. In Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings. 2009, 294-309. BibTeX

    @inproceedings{CDGH2009,
    	author = "S{\'e}bastien Canard and C{\'e}cile Delerabl{\'e}e and Aline Gouget and Emeline Hufschmitt and Fabien Laguillaumie and Herv{\'e} Sibert and Jacques Traor{\'e} and Damien Vergnaud",
    	title = "Fair E-Cash: Be Compact, Spend Faster",
    	booktitle = "Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings",
    	year = 2009,
    	pages = "294-309",
    	annote = "confint"
    }
    
  13. Eric Brier and Thomas Peyrin. Cryptanalysis of CubeHash. In Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings. 2009, 354-368. BibTeX

    @inproceedings{BrPe2009,
    	author = "Eric Brier and Thomas Peyrin",
    	title = "Cryptanalysis of CubeHash",
    	booktitle = "Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings",
    	year = 2009,
    	pages = "354-368",
    	annote = "confint"
    }
    
  14. Eric Brier, Shahram Khazaei, Willi Meier and Thomas Peyrin. Linearization Framework for Collision Attacks: Application to CubeHash and MD6. In Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings. 2009, 560-577. BibTeX

    @inproceedings{BKMP2009a,
    	author = "Eric Brier and Shahram Khazaei and Willi Meier and Thomas Peyrin",
    	title = "Linearization Framework for Collision Attacks: Application to CubeHash and MD6",
    	booktitle = "Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings",
    	year = 2009,
    	pages = "560-577",
    	annote = "confint"
    }
    
  15. Alexandre Berzati, Cécile Canovas-Dumas and Louis Goubin. Fault Analysis of Rabbit: Toward a Secret Key Leakage. In Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings. 2009, 72-87. BibTeX

    @inproceedings{BeCG2009,
    	author = "Alexandre Berzati and C{\'e}cile Canovas-Dumas and Louis Goubin",
    	title = "Fault Analysis of Rabbit: Toward a Secret Key Leakage",
    	booktitle = "Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings",
    	year = 2009,
    	pages = "72-87",
    	annote = "confint"
    }
    
  16. Alexandre Berzati, Cécile Canovas, Jean-Guillaume Dumas and Louis Goubin. Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable. In Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings. 2009, 414-428. BibTeX

    @inproceedings{BCDG2009a,
    	author = "Alexandre Berzati and C{\'e}cile Canovas and Jean-Guillaume Dumas and Louis Goubin",
    	title = "Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable",
    	booktitle = "Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings",
    	year = 2009,
    	pages = "414-428",
    	annote = "confint"
    }
    
  17. Côme Berbain, Olivier Billet, Jonathan Etrog and Henri Gilbert. An efficient forward private RFID protocol. In Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. 2009, 43-53. BibTeX

    @inproceedings{BBEG2009,
    	author = "C{\^o}me Berbain and Olivier Billet and Jonathan Etrog and Henri Gilbert",
    	title = "An efficient forward private RFID protocol",
    	booktitle = "Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009",
    	year = 2009,
    	pages = "43-53",
    	annote = "confint"
    }
    
  18. Jean-Philippe Aumasson, Eric Brier, Willi Meier, Mar\'ıa Naya-Plasencia and Thomas Peyrin. Inside the Hypercube. In Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings. 2009, 202-213. BibTeX

    @inproceedings{ABMN2009,
    	author = "Jean-Philippe Aumasson and Eric Brier and Willi Meier and Mar\'{\i}a Naya-Plasencia and Thomas Peyrin",
    	title = "Inside the Hypercube",
    	booktitle = "Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings",
    	year = 2009,
    	pages = "202-213",
    	annote = "confint"
    }
    

Misc

  1. Michael Quisquater. La cryptographie, des Egyptiens à nos jours. août 2009. Exposé invité à l'école d'été de Saint-Flour.. BibTeX

    @misc{Quis2009,
    	author = "Michael Quisquater",
    	title = "La cryptographie, des Egyptiens \`a nos jours",
    	month = "August",
    	year = 2009,
    	note = "Expos\'e invit\'e \`a l'\'ecole d'\'et\'e de Saint-Flour.",
    	annote = "confinv"
    }
    
  2. Louis Goubin and Olivier Ly. {Sûreté de fonctionnement et sécurité des algorithmes cryptographiques, in Multi-system & Internet Security Cookbook (MISC), vol. 42, pp. 77-82}. 2009. BibTeX

    @misc{GoLy2009,
    	author = "Louis Goubin and Olivier Ly",
    	title = "{S{\^u}ret{\'e} de fonctionnement et s{\'e}curit{\'e} des algorithmes cryptographiques, in Multi-system \& Internet Security Cookbook (MISC), vol. 42, pp. 77-82}",
    	year = 2009,
    	annote = "vulg"
    }
    
  3. Antoine Joux. Blockwise-Adaptive modes of operation (a tutorial). AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, 0. BibTeX

    @misc{Joux2009b,
    	author = "Antoine Joux",
    	title = "Blockwise-Adaptive modes of operation (a tutorial)",
    	howpublished = "AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia",
    	year = "June 24, 2009",
    	annote = "confinv"
    }
    
  4. Louis Goubin. Cryptography for the Security of Embedded Systems. US France Young Engineering Scientists Symposium, Identity Management - Research issues between security and privacy, Washington D.C., 0. BibTeX

    @misc{Goub2009,
    	author = "Louis Goubin",
    	title = "Cryptography for the Security of Embedded Systems",
    	howpublished = "US France Young Engineering Scientists Symposium, Identity Management - Research issues between security and privacy, Washington D.C.",
    	year = "July 7-9, 2009",
    	annote = "confinv"
    }
    
  5. Luca De Feo. Isogeny computation in small characteristics. ECC, University of Calgary, Calgary, Canada, 0. BibTeX

    @misc{DeF2009,
    	author = "De Feo, Luca",
    	title = "Isogeny computation in small characteristics",
    	howpublished = "ECC, University of Calgary, Calgary, Canada",
    	year = "August 2009",
    	annote = "confinv"
    }
    
  6. Luca De Feo. Fast arithmetic in Artin-Schreier towers over finite fields. RAIM, ENS, Lyon, France, 0. BibTeX

    @misc{DeF2009a,
    	author = "De Feo, Luca",
    	title = "Fast arithmetic in Artin-Schreier towers over finite fields",
    	howpublished = "RAIM, ENS, Lyon, France",
    	year = "October 2009",
    	annote = "confinv"
    }
    

PhdThesis

  1. Yannick Seurin. Primitives et protocoles cryptographiques à sécurité prouvée. Thèse, Université de Versailles-St Quentin, 2009. BibTeX

    @phdthesis{Seur2009,
    	author = "Seurin, Yannick",
    	title = "{Primitives et protocoles cryptographiques \`a s\'ecurit\'e prouv\'ee}",
    	school = "Universit{\'e} de Versailles-St Quentin",
    	year = 2009,
    	type = "Th\`ese",
    	month = "Juillet",
    	annote = "these"
    }
    

Proceedings

  1. Antoine Joux (ed.). Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings 5479. Springer, 2009. BibTeX

    @proceedings{Joux2009a,
    	title = "Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings",
    	year = 2009,
    	editor = "Antoine Joux",
    	volume = 5479,
    	series = "Lecture Notes in Computer Science",
    	publisher = "Springer",
    	annote = "confint",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	booktitle = "EUROCRYPT",
    	ee = "http://dx.doi.org/10.1007/978-3-642-01001-9",
    	isbn = "978-3-642-01000-2"
    }
    

Techreport

  1. Mar\'ıa Naya-Plasencia, Andrea Röck, Jean-Philippe Aumasson, Yann Laigle-Chapuy, Gaëtan Leurent, Willi Meier and Thomas Peyrin. Cryptanalysis of ESSENCE. 0. BibTeX

    @techreport{NRAL2009,
    	author = {Mar\'{\i}a Naya-Plasencia and Andrea R{\"o}ck and Jean-Philippe Aumasson and Yann Laigle-Chapuy and Ga{\"e}tan Leurent and Willi Meier and Thomas Peyrin},
    	title = "Cryptanalysis of ESSENCE",
    	year = "IACR Cryptology ePrint Archive, 2009/302",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2009/302",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 302,
    	volume = 2009
    }
    
  2. Valérie Nachef, Jacques Patarin and Joana Treger. Generic Attacks on Misty Schemes -5 rounds is not enough-. 0. BibTeX

    @techreport{NaPT2009,
    	author = "Val{\'e}rie Nachef and Jacques Patarin and Joana Treger",
    	title = "Generic Attacks on Misty Schemes -5 rounds is not enough-",
    	year = "IACR Cryptology ePrint Archive, 2009/405",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2009/405",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 405,
    	volume = 2009
    }
    
  3. Valérie Nachef and Jacques Patarin. I shall love you up to the death. 0. BibTeX

    @techreport{NaPa2009,
    	author = "Val{\'e}rie Nachef and Jacques Patarin",
    	title = "I shall love you up to the death",
    	year = "IACR Cryptology ePrint Archive, 2009/166",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2009/166",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 166,
    	volume = 2009
    }
    
  4. Antoine Joux and Stefan Lucks. Improved generic algorithms for 3-collisions. 0. BibTeX

    @techreport{JoLu2009,
    	author = "Antoine Joux and Stefan Lucks",
    	title = "Improved generic algorithms for 3-collisions",
    	year = "IACR Cryptology ePrint Archive, 2009/305",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2009/305",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 305,
    	volume = 2009
    }
    
  5. Henri Gilbert and Thomas Peyrin. Super-Sbox Cryptanalysis: Improved Attacks for AES-like permutations. 0. BibTeX

    @techreport{GiPe2009,
    	author = "Henri Gilbert and Thomas Peyrin",
    	title = "Super-Sbox Cryptanalysis: Improved Attacks for AES-like permutations",
    	year = "IACR Cryptology ePrint Archive, 2009/531",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2009/531",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 531,
    	volume = 2009
    }
    
  6. Nadia El Mrabet, Nicolas Guillermin and Sorina Ionica. A study of pairing computation for elliptic curves with embedding degree 15. 0. BibTeX

    @techreport{ElGI2009,
    	author = "Nadia {El Mrabet} and Nicolas Guillermin and Sorina Ionica",
    	title = "A study of pairing computation for elliptic curves with embedding degree 15",
    	year = "IACR Cryptology ePrint Archive, 2009/370",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2009/370",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 370,
    	volume = 2009
    }
    
  7. Jean-Sébastien Coron, Antoine Joux, Ilya Kizhvatov, David Naccache and Pascal Paillier. Fault Attacks on RSA Signatures with Partially Unknown Messages. 0. BibTeX

    @techreport{CJKN2009,
    	author = "Jean-S{\'e}bastien Coron and Antoine Joux and Ilya Kizhvatov and David Naccache and Pascal Paillier",
    	title = "Fault Attacks on RSA Signatures with Partially Unknown Messages",
    	year = "IACR Cryptology ePrint Archive, 2009/309",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2009/309",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 309,
    	volume = 2009
    }
    
  8. Jean-Sébastien Coron, Yevgeniy Dodis, Avradip Mandal and Yannick Seurin. A Domain Extender for the Ideal Cipher. 0. BibTeX

    @techreport{CDMS2009,
    	author = "Jean-S{\'e}bastien Coron and Yevgeniy Dodis and Avradip Mandal and Yannick Seurin",
    	title = "A Domain Extender for the Ideal Cipher",
    	year = "IACR Cryptology ePrint Archive, 2009/356",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2009/356",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 356,
    	volume = 2009
    }
    
  9. Eric Brier, Shahram Khazaei, Willi Meier and Thomas Peyrin. Linearization Framework for Collision Attacks: Application to CubeHash and MD6. 0. BibTeX

    @techreport{BKMP2009,
    	author = "Eric Brier and Shahram Khazaei and Willi Meier and Thomas Peyrin",
    	title = "Linearization Framework for Collision Attacks: Application to CubeHash and MD6",
    	year = "IACR Cryptology ePrint Archive, 2009/382",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2009/382",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 382,
    	volume = 2009
    }
    
  10. Emmanuel Bresson, Anne Canteaut, Beno\^ıt Chevallier-Mames, Christophe Clavier, Thomas Fuhr, Aline Gouget, Thomas Icart, Jean-François Misarsky, Mar\'ıa Naya-Plasencia, Pascal Paillier, Thomas Pornin, Jean-René Reinhard, Céline Thuillet and Marion Videau. Indifferentiability with Distinguishers: Why Shabal Does Not Require Ideal Ciphers. 0. BibTeX

    @techreport{BCCC2009,
    	author = "Emmanuel Bresson and Anne Canteaut and Beno\^{\i}t Chevallier-Mames and Christophe Clavier and Thomas Fuhr and Aline Gouget and Thomas Icart and Jean-Fran\c{c}ois Misarsky and Mar\'{\i}a Naya-Plasencia and Pascal Paillier and Thomas Pornin and Jean-Ren{\'e} Reinhard and C{\'e}line Thuillet and Marion Videau",
    	title = "Indifferentiability with Distinguishers: Why Shabal Does Not Require Ideal Ciphers",
    	year = "IACR Cryptology ePrint Archive, 2009/199",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2009/199",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 199,
    	volume = 2009
    }
    
  11. Charles Bouillaguet, Pierre-Alain Fouque, Antoine Joux and Joana Treger. A Family of Weak Keys in HFE (and the Corresponding Practical Key-Recovery). 0. BibTeX

    @techreport{BFJT2009,
    	author = "Charles Bouillaguet and Pierre-Alain Fouque and Antoine Joux and Joana Treger",
    	title = "A Family of Weak Keys in HFE (and the Corresponding Practical Key-Recovery)",
    	year = "IACR Cryptology ePrint Archive, 2009/619",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2009/619",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 619,
    	volume = 2009
    }
    
  12. Olivier Billet, Jacques Patarin and Yannick Seurin. Analysis of Intermediate Field Systems. 0. BibTeX

    @techreport{BiPS2009,
    	author = "Olivier Billet and Jacques Patarin and Yannick Seurin",
    	title = "Analysis of Intermediate Field Systems",
    	year = "IACR Cryptology ePrint Archive, 2009/542",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2009/542",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 542,
    	volume = 2009
    }
    
  13. Alexandre Berzati, Cécile Canovas, Jean-Guillaume Dumas and Louis Goubin. Fault Attacks on RSA Public Keys: Left-To-Right Implementations are also Vulnerable. 0. BibTeX

    @techreport{BCDG2009,
    	author = "Alexandre Berzati and C{\'e}cile Canovas and Jean-Guillaume Dumas and Louis Goubin",
    	title = "Fault Attacks on RSA Public Keys: Left-To-Right Implementations are also Vulnerable",
    	year = "CoRR abs/0901.0911, 2009",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://arxiv.org/abs/0901.0911",
    	journal = "CoRR",
    	volume = "abs/0901.0911"
    }
    
  14. Daniel V Bailey, Lejla Batina, Daniel J Bernstein, Peter Birkner, Joppe W Bos, Hsieh-Chung Chen, Chen-Mou Cheng, Gauthier Van Damme, Giacomo Meulenaer, Luis Dominguez J Perez, Junfeng Fan, Tim Güneysu, Frank K Gürkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Ruben Niederhagen, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel, Anthony Van Herrewege and Bo-Yin Yang. Breaking ECC2K-130. 0. BibTeX

    @techreport{BBBB2009a,
    	author = {Daniel V. Bailey and Lejla Batina and Daniel J. Bernstein and Peter Birkner and Joppe W. Bos and Hsieh-Chung Chen and Chen-Mou Cheng and Gauthier Van Damme and Giacomo de Meulenaer and Luis J. Dominguez Perez and Junfeng Fan and Tim G{\"u}neysu and Frank K. G{\"u}rkaynak and Thorsten Kleinjung and Tanja Lange and Nele Mentens and Ruben Niederhagen and Christof Paar and Francesco Regazzoni and Peter Schwabe and Leif Uhsadel and Anthony Van Herrewege and Bo-Yin Yang},
    	title = "Breaking ECC2K-130",
    	year = "IACR Cryptology ePrint Archive, 2009/541",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2009/541",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 541,
    	volume = 2009
    }
    
  15. Daniel V Bailey, Brian Baldwin, Lejla Batina, Daniel J Bernstein, Peter Birkner, Joppe W Bos, Gauthier Van Damme, Giacomo Meulenaer, Junfeng Fan, Tim Güneysu, Frank K Gürkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Christof Paar, Francesco Regazzoni, Peter Schwabe and Leif Uhsadel. The Certicom Challenges ECC2-X. 0. BibTeX

    @techreport{BBBB2009,
    	author = {Daniel V. Bailey and Brian Baldwin and Lejla Batina and Daniel J. Bernstein and Peter Birkner and Joppe W. Bos and Gauthier Van Damme and Giacomo de Meulenaer and Junfeng Fan and Tim G{\"u}neysu and Frank K. G{\"u}rkaynak and Thorsten Kleinjung and Tanja Lange and Nele Mentens and Christof Paar and Francesco Regazzoni and Peter Schwabe and Leif Uhsadel},
    	title = "The Certicom Challenges ECC2-X",
    	year = "IACR Cryptology ePrint Archive, 2009/466",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2009/466",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 466,
    	volume = 2009
    }
    
 

 Imprimer  E-mail

Our website is protected by DMC Firewall!